CODE BLUE/CODE BLUE 2013/CodeBlue01 A Security Barrier Device Regardless of OS or Applications by Kenji Toda.mp4 |
89.3 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 Fight Against Citadel in Japan by You Nakatsuru.mp4 |
89.7 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 HTML5 Security & Headers - X-Crawling-Response-Header - by Tomoyuki Shigemori.mp4 |
41.8 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 Intel Management Engine Secrets by Igor Skochinsky.mp4 |
71.6 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 Keynote - CODE BLUE in the ICU by Jeff Moss.mp4 |
99.2 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 Keynote - CTF - All the Cool Kids are doing it by Chris Eagle.mp4 |
115.7 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 Networked Home Appliances and Vulnerabilities. by Yukihisa Horibe.mp4 |
99.7 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 Preventing hard disk firmware manipulation attack and disaster recovery.mp4 |
62.2 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 SCADA Software or Swiss Cheese Software by Celil UNUVER.mp4 |
47.3 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 The Current State of Automotive Security by Chris Valasek.mp4 |
93.2 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 libinjection from SQLi to XSS by Nick Galbreath.mp4 |
41.9 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 o-checker - Malicious document file detection tool by Yuuhei Ootsubo.mp4 |
98.4 MB |
CODE BLUE/CODE BLUE 2013/CodeBlue01 various tricks for remote linux exploits by Seokha Lee (wh1ant).mp4 |
76.9 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun.mp4 |
86.5 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 David Jacoby - How I Hacked My Home.mp4 |
60.2 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 David Seidman - Microsoft Vulnerability Research How to be a Finder as a Vendor.mp4 |
54.8 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Dongcheol Hong - Drone attack by malware and network hacking.mp4 |
91.9 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Hiroshi Shinotsuka - how to avoid the Detection by Malware.mp4 |
33.6 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Ilfak Guilfanov - Keynote The story of IDA Pro.mp4 |
52.6 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Keren Elazari - Keynote The 5 biggest problems of cyber security.mp4 |
101.3 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Kuniyasu Suzaki - DeviceDisEnabler.mp4 |
66.5 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 Takahiro Matsuki & Dennis Kengo Oka.mp4 |
94.1 MB |
CODE BLUE/CODE BLUE 2014 (2014 12 18-19)/CODE BLUE 2014 The active use and exploitation of Microsoft s Application Compatibility Framework.mp4 |
69.5 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.mp4 |
88.9 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/(In)Security of Medical Devices by Florian Grunow - CODE BLUE 2015.srt |
74 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/A new exploitation method to bypass stack canaries by Yuki Koike - CODE BLUE 2015.mp4 |
37.2 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.mp4 |
55.6 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Abusing Adobe Readers JavaScript APIs by Abdul Aziz Hariri and Brian Gorenc - CODE BLUE 2015.srt |
41 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.mp4 |
97.7 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/An Abusive Relationship with AngularJS by Mario Heiderich - CODE BLUE 2015.srt |
54 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.mp4 |
77 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Cybersecurity of SmartGrid by Aleksandr Timorin & Sergey Gordeychik - CODE BLUE 2015.srt |
39 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Defeating Firefox by Muneaki Nishimura - CODE BLUE 2015.mp4 |
57 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.mp4 |
76.2 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Extortion and Cooperation in the Zero-day Market by Alfonso De Gregorio - CODE BLUE 2015.srt |
50 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.mp4 |
80.2 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/How South Korea Invests in Human Capital for Cyber-Security by Seungjoo Gabriel Kim - CODE BLUE 2015.srt |
35 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Is there an EFI monster inside your apple by Pedro Vilaca - CODE BLUE 2015.mp4 |
98.1 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Is there an EFI monster inside your apple by Pedro Vilccca - CODE BLUE 2015.srt |
86 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Keynote The Singularity is Near by Takuya Matsuda - CODE BLUE 2015.mp4 |
65.2 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.mp4 |
76.9 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Making and Breaking Machine Learning Anomaly Detectors in Real Life by Clarence Chio - CODE BLUE 2015.srt |
76 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/New immune system of information security from CHINA by Xiaodun Fang - CODE BLUE 2015.mp4 |
77.2 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.mp4 |
45.6 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Ninja Correlation of APT Binaries by Bhavna Soman - CODE BLUE 2015.srt |
39 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/PANDEMONIUM Automated Identification of Cryptographic Algorithms by Yuma Kurogome - CODE BLUE 2015.mp4 |
35.1 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Practical network defense at scale by Travis Carelock - CODE BLUE 2015.mp4 |
98.5 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Practical network defense at scale by Travis Carelock - CODE BLUE 2015.srt |
73 KB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nakamura - CODE BLUE 2015.mp4 |
78.8 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/The Only Way to Tell the Truth is in Fiction by Richard Thieme - CODE BLUE 2015.mp4 |
88.9 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/Wireless security testing with attack by Keiichi Horiai - CODE BLUE 2015.mp4 |
83.5 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/[audio] Backdoor master key for MS Office by Shigeo Mitsunari and Yoshinori Takesako - CODE BLUE 2015.mp4 |
42.6 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/[audio] Threat Analysis of Windows 10 IoT Core by Naohide Waguri - CODE BLUE 2015.mp4 |
21.9 MB |
CODE BLUE/CODE BLUE 2015 (2015 10 28-29)/[audio]Attack XSS Attacks By Abusing the XSS Filter by Masato Kinugawa - CODE BLUE 2015.mp4 |
25.1 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] (P)FACE into the Apple core and exploit to root by Moony Li & Jack Tang.mp4 |
53.5 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] ATMS how to break them to stop the fraud by Olga Kochetova & Alexey Osipov.mp4 |
55 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] About CGC the world’s first all-machine hacking tournament by Tyler Nighswander.mp4 |
63.9 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Air-Gap security by Mordechai Guri, Yisroel Mirsky, Yuval Elovici..mp4 |
130.4 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Analyzing the Security of Mobile Apps for Automobiles by Naohide Waguri.mp4 |
50.1 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Around the Web in 80 Hours Scalable Fingerprinting with Chromium Automationby Isaac Dawson.mp4 |
58.1 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Background Story of Operation neutralizing banking malware by Kazuki Takada.mp4 |
51.1 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Be a Binary Rockstar by Sophia DAntoine.mp4 |
184.8 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] COFI break by Ron Shina & Shlomi Oberman.mp4 |
64 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] DVB-T Hacking by Amihai Neiderman.mp4 |
31.7 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] DeathNote of Microsoft Windows Kernel by Peter Hlavaty & Jin Long.mp4 |
132.7 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] EXOTIC DATA RECOVERY & PARADAIS by Dai Shimogaito.mp4 |
91.9 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Electron - Build cross platform desktop XSS, it’s easier than you think by Yosuke Hasegawa.mp4 |
49.7 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Esoteric Web Application Vulnerabilities by Andres Riancho.mp4 |
71.6 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Facebook Malware Tag Me If You Can by Ido Naor & Dani Goland.mp4 |
331.2 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] House of Einherjar — Yet Another Heap Exploitation Technique on GLIBC by Hiroki Matsukumao.mp4 |
215.6 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Keynote Digital Society e-Estonia by Anna Piperal.mp4 |
100.4 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Keynote How much security is too much by Karsten Nohl.mp4 |
93 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Method of detecting vulnerability in WebApps using Machine Learning by Isao Takaesu.mp4 |
109.6 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Using the CGC’s fully automated vulnerability detection tools by Inhyuk Seo & Jisoo Park.mp4 |
64.8 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] Who put the backdoor in my modem by Ewerson Guimaraes.mp4 |
88.9 MB |
CODE BLUE/CODE BLUE 2016 (10 18-21 2016)/[CB16] WireGuard Next Generation Abuse-Resistant Kernel Network Tunnelby Jason Donenfeld.mp4 |
61.7 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17 ](In)Security of Japanese IT Asset Management Software.mp4 |
51.4 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!.mp4 |
41.4 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Androsia A step ahead in securing in-memory Android application data.mp4 |
47.5 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Detection index learning based on cyber threat intelligence and its application.mp4 |
35.7 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] For the Greater Good Leveraging VMware's RPC Interface for fun and profit.mp4 |
60.2 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Fun and Practice for exercising your ARM(64) by Jack Tang, Moony Li.mp4 |
1.8 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] George Hotz - Keynote Make your car self-driving using open-source software.mp4 |
68.3 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Industroyer biggest threat to industrial control systems since Stuxnet.mp4 |
30 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] LG vs. Samsung Smart TV Which Is Better for Tracking You by Sangmin Lee.mp4 |
70.9 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Legal problems of investigation into private areas in cyber crime by Ikuo Takahashi.mp4 |
62.6 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] National Security and Public-Private Partnership for Cybersecurity Strengths and Challenges.mp4 |
77.9 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Ory Segal - Passive Fingerprinting of HTTP 2 Clients..mp4 |
67.3 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Possibility of arbitrary code execution by Step-Oriented Programming.mp4 |
42.8 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] PowerShell Inside Out Applied .NET Hacking for Enhanced Visibility.mp4 |
60.4 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Pursue the Attackers – Identify and Investigate Lateral Movement Based on Behavior Pattern –.mp4 |
43.9 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] Take a Jailbreak -Stunning Guards for iOS Jailbreak-.mp4 |
51.9 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] The Art of Exploiting Unconventional Use-after-free Bugs in Android Kernel - YouTube.mp4 |
39.6 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17] 吉村 孝広, 吉村 賢哉 - Trueseeing Effective Dataflow Analysis over Dalvik Opcodes.mp4 |
67 MB |
CODE BLUE/CODE BLUE 2017 (11 8-10, 2017)/[CB17][確認中] 日本を狙うAPT攻撃の全体像 - APT攻撃インシデントSTIXデータベース.mp4 |
43 MB |
CODE BLUE/CODE BLUE thank you.txt |
1 KB |
CODE BLUE/Code Blue 2019/[CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security.en(transcribed).srt |
58 KB |
CODE BLUE/Code Blue 2019/[CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security.mp4 |
48.5 MB |
CODE BLUE/Code Blue 2019/[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.en(transcribed).srt |
43 KB |
CODE BLUE/Code Blue 2019/[CB19] Attacking DRM subsystem to gain kernel privilege on Chromebooks by Di Shen.mp4 |
39.8 MB |
CODE BLUE/Code Blue 2019/[CB19] Coinbase and the Firefox 0-day by Philip Martin.en(transcribed).srt |
54 KB |
CODE BLUE/Code Blue 2019/[CB19] Coinbase and the Firefox 0-day by Philip Martin.mp4 |
44.9 MB |
CODE BLUE/Code Blue 2019/[CB19] Hardware Wallet Security by Sergei Volokitin.en(transcribed).srt |
61 KB |
CODE BLUE/Code Blue 2019/[CB19] Hardware Wallet Security by Sergei Volokitin.mp4 |
45.1 MB |
CODE BLUE/Code Blue 2019/[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.en(transcribed).srt |
79 KB |
CODE BLUE/Code Blue 2019/[CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns.mp4 |
69.5 MB |
CODE BLUE/Code Blue 2019/[CB19] KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.en(transcribed).srt |
53 KB |
CODE BLUE/Code Blue 2019/[CB19] KeynoteCyberspace - A Lawless Wild West or Orderly Chaos by Liis Vihul.mp4 |
51.8 MB |
CODE BLUE/Code Blue 2019/[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.en(transcribed).srt |
83 KB |
CODE BLUE/Code Blue 2019/[CB19] KeynoteHacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew Futter.mp4 |
73.2 MB |
CODE BLUE/Code Blue 2019/[CB19] Let's Make Windows Defender Angry Antivirus can be an oracle! by Ryo Ichikawa.en(transcribed).srt |
35 KB |
CODE BLUE/Code Blue 2019/[CB19] Let's Make Windows Defender Angry Antivirus can be an oracle! by Ryo Ichikawa.mp4 |
48.1 MB |
CODE BLUE/Code Blue 2019/[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.en(transcribed).srt |
43 KB |
CODE BLUE/Code Blue 2019/[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Aprozper.mp4 |
34.5 MB |
CODE BLUE/Code Blue 2019/[CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang.en(transcribed).srt |
49 KB |
CODE BLUE/Code Blue 2019/[CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang.mp4 |
44.5 MB |
CODE BLUE/Code Blue 2019/[CB19] Semzhu-Project - 手で作る組込み向けハイパーバイザと攻撃検知手法の新しい世界 by 朱 義文.mp4 |
63.1 MB |
CODE BLUE/Code Blue 2019/[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.en(transcribed).srt |
58 KB |
CODE BLUE/Code Blue 2019/[CB19] Spyware, Ransomware and Worms. How to prevent the next SAP tragedy by Jordan Santarsieri.mp4 |
55.9 MB |
CODE BLUE/Code Blue 2019/[CB19] [BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.en(transcribed).srt |
24 KB |
CODE BLUE/Code Blue 2019/[CB19] [BB] FileInsight-plugins Decoding toolbox for malware analysis by Nobutaka Mantani.mp4 |
25.3 MB |
CODE BLUE/Code Blue 2019/[CB19] [BB] S-TIP サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝.mp4 |
32.2 MB |
CODE BLUE/Code Blue 2019/[CB19][BB] Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功.mp4 |
27.1 MB |
CODE BLUE/Code Blue 2019/[CB19][BB] MalCfgParser A Lightweight Malware Configuration Parsing Tool.en(transcribed).srt |
17 KB |
CODE BLUE/Code Blue 2019/[CB19][BB] MalCfgParser A Lightweight Malware Configuration Parsing Tool.mp4 |
15.3 MB |
CODE BLUE/Code Blue 2019/[CB19][BB] Shattering the darkダークウェブの脆弱性を暴く by 吉村 孝広、吉村 賢哉.mp4 |
80.6 MB |
CODE BLUE/Code Blue 2019/[CB19][BB] Wifi sniffing with the WifiKraken by Mike Spicer.en(transcribed).srt |
66 KB |
CODE BLUE/Code Blue 2019/[CB19][BB] Wifi sniffing with the WifiKraken by Mike Spicer.mp4 |
64.6 MB |
CODE BLUE/Code Blue 2019/[CB19][BB] tknk_scanner v2community-based integrated malware identification system by 中島 将太、野村 敬太.mp4 |
187.4 MB |
CODE BLUE/Code Blue logo.jpg |
5 KB |